2022
DOI: 10.1109/tbdata.2017.2761386
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Trustworthiness Management for Malicious User Detection in Big Data Collection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(2 citation statements)
references
References 46 publications
0
2
0
Order By: Relevance
“…Numerous indicators may be used to measure the success of a system built to identify harmful user behaviour using CLM and optimization techniques [28] [31]. Considering the frequently used assessment metrics.…”
Section: B Experimental Resultsmentioning
confidence: 99%
“…Numerous indicators may be used to measure the success of a system built to identify harmful user behaviour using CLM and optimization techniques [28] [31]. Considering the frequently used assessment metrics.…”
Section: B Experimental Resultsmentioning
confidence: 99%
“…To identify anomalous and bot accounts, many previous studies have leverage user-generated data and deploy machine learning methods in mining the differences between normal and malicious users. Typically, user-generated data contains diverse user activities and user interests during using an app or mobile devices, such as their interactions with items, their mobility patterns, their followings of other user accounts and some other temporal records [58,140,145]. Especially when considering the user data generated from mobile phone, we can build feature-rich demographic information for a user because the data collected from mobile phone contains much more useful information than an single app.…”
Section: Identify User Professions Based On Privacy-preserved Mobile ...mentioning
confidence: 99%